Home
last modified time | relevance | path

Searched refs:__bpf_call_base (Results 1 – 9 of 9) sorted by relevance

/linux/include/linux/
H A Dfilter.h464 #define BPF_CALL_IMM(x) ((void *)(x) - (void *)__bpf_call_base)
1132 u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
1135 (void *)__bpf_call_base)
/linux/kernel/bpf/
H A Dcore.c1289 * kernel, it's always at a fixed location. __bpf_call_base in bpf_jit_get_func_addr()
1293 addr = (u8 *)__bpf_call_base + imm; in bpf_jit_get_func_addr()
1557 noinline u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) in __bpf_call_base() function
1561 EXPORT_SYMBOL_GPL(__bpf_call_base);
2032 BPF_R0 = (__bpf_call_base + insn->imm)(BPF_R1, BPF_R2, BPF_R3, in ___bpf_prog_run()
H A Dverifier.c21527 /* point imm to __bpf_call_base+1 from JITs point of view */ in jit_subprogs()
21660 * address of the callee's JITed image from __bpf_call_base in jit_subprogs()
21882 * __bpf_call_base, unless the JIT needs to call functions that are in fixup_kfunc_call()
22843 insn->imm = fn->func - __bpf_call_base; in do_misc_fixups()
/linux/arch/x86/net/
H A Dbpf_jit_comp32.c1631 jmp_offset = (u8 *)__bpf_call_base + insn->imm - end_addr; in emit_kfunc_call()
2106 func = (u8 *) __bpf_call_base + imm32; in do_jit()
H A Dbpf_jit_comp.c2312 func = (u8 *) __bpf_call_base + imm32; in do_jit()
/linux/arch/sparc/net/
H A Dbpf_jit_comp_64.c1216 u8 *func = ((u8 *)__bpf_call_base) + imm; in build_insn()
/linux/arch/arm/net/
H A Dbpf_jit_32.c2056 const u32 func = (u32)__bpf_call_base + (u32)imm; in build_insn()
/linux/net/core/
H A Dfilter.c485 * evict __bpf_call_base() as an optimization. Placed here in convert_bpf_extensions()
488 BUG_ON(__bpf_call_base(0, 0, 0, 0, 0) != 0); in convert_bpf_extensions()
/linux/lib/
H A Dtest_bpf.c15548 if ((long)__bpf_call_base + insn->imm != addr) in prepare_tail_call_tests()